default search action
Andrzej R. Pach
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [i3]Ireneusz Szczesniak, Piotr Cholda, Andrzej R. Pach, Bozena Wozna-Szczesniak:
Interoperator fixed-mobile network sharing. CoRR abs/1905.04736 (2019) - 2017
- [j15]Tytus Kurek, Marcin Niemiec, Artur Lason, Andrzej R. Pach:
Universal privacy-preserving platform for SecaaS services. Int. J. Netw. Manag. 27(5) (2017) - [c18]Tytus Kurek, Marcin Niemiec, Artur Lason, Andrzej R. Pach:
Intrusion Prevention System Decision Diagram in Security-as-a-Service Solutions. MCSS 2017: 47-61 - [c17]Ireneusz Szczesniak, Andrzej R. Pach, Bozena Wozna-Szczesniak:
Performance of interoperator fixed-mobile network sharing. ONDM 2017: 1-5 - 2016
- [i2]Ireneusz Szczesniak, Artur Gola, Andrzej Jajszczyk, Andrzej R. Pach, Bozena Wozna-Szczesniak:
Itinerant routing in elastic optical networks. CoRR abs/1609.04906 (2016) - [i1]Ireneusz Szczesniak, Andrzej R. Pach, Bozena Wozna-Szczesniak:
Performance of Interoperator Fixed-Mobile Network Sharing. CoRR abs/1611.01093 (2016) - 2015
- [c16]Ireneusz Szczesniak, Piotr Cholda, Andrzej R. Pach, Bozena Wozna-Szczesniak:
Interoperator fixed-mobile network sharing. ONDM 2015: 192-197 - 2014
- [c15]Ireneusz Szczesniak, Andrzej Jajszczyk, Andrzej R. Pach:
Mobile routing in elastic optical networks. ICCC 2014: 107-111 - 2013
- [j14]Marcin Niemiec, Andrzej R. Pach:
Management of security in quantum cryptography. IEEE Commun. Mag. 51(8) (2013) - [j13]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. Secur. Commun. Networks 6(4): 509-522 (2013) - [j12]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes. Wirel. Networks 19(6): 1135-1153 (2013) - 2012
- [c14]Marcin Niemiec, Andrzej R. Pach:
The measure of security in quantum cryptography. GLOBECOM 2012: 967-972 - 2011
- [j11]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions. Comput. Networks 55(3): 622-635 (2011) - 2010
- [j10]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c13]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
BusySiMOn - A New Protocol for IEEE 802.11 EDCA-Based Ad-Hoc Networks with Hidden Nodes. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [e1]Józef Wozniak, Jerzy Konorski, Ryszard J. Katulski, Andrzej R. Pach:
Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009. Proceedings. IFIP Advances in Information and Communication Technology 308, Springer 2009, ISBN 978-3-642-03840-2 [contents] - 2008
- [c12]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. ADHOC-NOW 2008: 176-188 - [c11]Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach:
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes. ADHOC-NOW 2008: 380-390 - [c10]Katarzyna Kosek, Marek Natkaniec, Luca Vollero, Andrzej R. Pach:
Performance Analysis of 802.11e Networks with Hidden Nodes in a Star Topology. CCNC 2008: 440-441 - [c9]Katarzyna Kosek, Marek Natkaniec, Luca Vollero, Andrzej R. Pach:
An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. ICOIN 2008: 1-5 - [c8]Szymon Szott, Marek Natkaniec, Roberto Canonico, Andrzej R. Pach:
Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs. WCNC 2008: 1356-1361 - 2007
- [j9]Andrzej R. Pach:
Introduction to Coding Theory [Book Review]. IEEE Commun. Mag. 45(2): 18 (2007) - 2006
- [j8]Andrzej R. Pach:
Book reviews. IEEE Commun. Mag. 44(3): 12 (2006) - 2000
- [j7]Andrzej R. Pach:
Information systems and data compression [Book Review]. IEEE Commun. Mag. 38(9): 38-42 (2000) - [c7]Marek Natkaniec, Andrzej R. Pach:
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations. PWC 2000: 157-168 - [c6]Marek Natkaniec, Andrzej R. Pach:
An Analysis of the Back-Off Mechanism Used in IEEE 802.11 Networks. ISCC 2000: 444-449 - [c5]Marek Natkaniec, Andrzej R. Pach:
An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance. WCNC 2000: 819-823
1990 – 1999
- 1999
- [j6]Andrzej R. Pach, Zdzislaw Papir:
Guest Editorial broadband access copper technologies. IEEE Commun. Mag. 37(5): 58 (1999) - 1997
- [j5]Niels Engell Andersen, Paulo M. N. Nordeste, A. Manuel de Oliveira Duarte, Hans Erik Lassen, Anders Ekblad, Andrzej R. Pach, Krzysztof Amborski, Lars Dittmann:
Broadbandloop: a full-service access network for residential and small business users. IEEE Commun. Mag. 35(12): 88-93 (1997) - 1995
- [j4]Andrzej R. Pach, Sergio Palazzo, Daniela Panno:
Delay Analysis of DQDB Networks with Slot Preuse and Reuse. Comput. Commun. 18(5): 338-344 (1995) - 1993
- [j3]Andrzej R. Pach, Sergio Palazzo, Daniela Panno:
Slot Pre-Using in IEEE 802.6 Metropolitan Area Networks. IEEE J. Sel. Areas Commun. 11(8): 1249-1258 (1993) - [c4]Andrzej R. Pach, Sergio Palazzo, Daniela Panno:
Overload throughput performance of different erasure node protocols for DQDB networks. LCN 1993: 130-138 - 1992
- [j2]Janusz Filipiak, Andrzej R. Pach:
Engineering education in Poland. IEEE Commun. Mag. 30(11): 58-64 (1992)
1980 – 1989
- 1989
- [j1]Andrzej Dziech, Andrzej R. Pach:
Bounds on the throughput of an unslotted ALOHA channel in the case of a heterogeneous users' population. Kybernetika 25(6): 476-485 (1989) - 1986
- [c3]Andrzej R. Pach:
A Performance Comparison of Random Access Packet-Switched Systems with an Intelligent Control Node. ICCC 1986: 631-636 - 1984
- [c2]Janusz Filipiak, Andrzej R. Pach:
Selection of Coefficients for a Diffusion-Equation Model of Multi-Server Queue. Performance 1984: 135-146 - [c1]Andrzej R. Pach:
Performance Evaluation of ALOHA-Type Star Broadcast Systems with and Intelligent Central Node. Performance 1984: 225-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint